Sciweavers

353 search results - page 58 / 71
» PUX: patterns of user experience
Sort
View
SAC
2010
ACM
14 years 21 days ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
SIGCOMM
2003
ACM
14 years 19 days ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
ISCIS
2003
Springer
14 years 18 days ago
Virtual Interval Caching Scheme for Interactive Multimedia Streaming Workload
Abstract. We carefully believe that server workload for interactive multimedia service exhibits different characteristics from legacy application, e.g. ftp server, web server, ASP...
Kyoungwoon Cho, Yeonseung Ryu, Youjip Won, Kern Ko...
SSDBM
2010
IEEE
188views Database» more  SSDBM 2010»
14 years 15 days ago
Similarity Estimation Using Bayes Ensembles
Similarity search and data mining often rely on distance or similarity functions in order to provide meaningful results and semantically meaningful patterns. However, standard dist...
Tobias Emrich, Franz Graf, Hans-Peter Kriegel, Mat...
VLDB
1993
ACM
116views Database» more  VLDB 1993»
13 years 11 months ago
Algebraic Optimization of Computations over Scientific Databases
Although scientific data analysis increasingly requires accessandmanipulation of large quantitiesof data,current databasetechnology fails to meet the needsof scientific processing...
Richard H. Wolniewicz, Goetz Graefe